Author of the publication

Secure social multimedia content distribution based on social network analysis.

, , , , , , and . Int. J. Reason. based Intell. Syst., 8 (1/2): 69-75 (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Joint Fingerpriting and Encryption in Hybrid domains for Multimedia Sharing in Social Networks., , , , , and . DMS, page 22-29. Knowledge Systems Institute Graduate School, (2014)An Improved Two-Factor Mutual Authentication Scheme with Key Agreement in Wireless Sensor Networks., , , and . KSII Trans. Internet Inf. Syst., 11 (11): 5556-5573 (2017)Secure Multimedia Big Data Sharing in Social Networks Using Fingerprinting and Encryption in the JPEG2000 Compressed Domain., , , , , , and . TrustCom, page 616-621. IEEE Computer Society, (2014)An Improved Biometric-Based User Authentication Scheme for C/S System., , , and . IJDSN, (2014)Cryptanalysis of Kim Jiye et al.'s Two-Factor Mutual Authentication with Key Agreement in WSNs., , , , and . J. Commun., 11 (1): 58-63 (2016)Joint Fingerprinting and Encryption for JPEG Images Sharing in Mobile Social Network., , , , , and . DMS, page 264-273. Knowledge Systems Institute, (2015)On Effective Capacity and Effective Energy Efficiency in Relay-Assisted Wireless Networks., , , , and . IEEE Trans. Vehicular Technology, 67 (5): 4389-4400 (2018)Joint fingerprinting and encryption in hybrid domains for multimedia sharing in social networks., , , , , and . J. Vis. Lang. Comput., 25 (6): 658-666 (2014)Secure social multimedia content distribution based on social network analysis., , , , , , and . Int. J. Reason. based Intell. Syst., 8 (1/2): 69-75 (2016)